
SCCMHunter was developed and tested in lab environments. Performance may vary in production networks. Please report issues on GitHub if you encounter problems.
Attack Methodology
SCCMHunter follows a systematic approach to SCCM exploitation:1. Discovery and Enumeration
The tool queries LDAP through multiple methods to identify SCCM infrastructure:Schema Extension Discovery
Schema Extension Discovery
Checks the DACL for the ‘System Management’ container manually created during AD schema extension
Management Point Resolution
Management Point Resolution
Resolves any published Management Points that clients use for communication
Deployment Services Detection
Deployment Services Detection
Identifies PXE-enabled Distribution Points using Windows Deployment Services
Naming Convention Search
Naming Convention Search
Searches for “SCCM” and “MECM” keywords throughout the directory based on common naming practices
2. Target Profiling
Once targets are identified, SCCMHunter profiles them using the SMB module:- Share Analysis: Checks for default shares required by specific SCCM roles
- SMB Signing Status: Determines SMB signing configuration for potential relay attacks
- Service Detection: Identifies MSSQL services and SMS Provider roles
- Attack Surface Mapping: Builds a comprehensive picture of potential attack paths
3. Exploitation Modules
HTTP Module
Abuse client enrollment processes using techniques from @xpn
MSSQL Module
Leverage MSSQL relay attacks for complete site server takeover (@_mayyhem)
DPAPI Module
Extract Network Access Accounts from compromised SCCM clients
Admin Module
Post-exploitation command and control for lateral movement and persistence
Tool Capabilities
Comprehensive SCCM Assessment
SCCMHunter provides end-to-end capabilities for SCCM security assessment:
- Automated Discovery: LDAP-based enumeration of SCCM infrastructure
- Intelligent Profiling: SMB-based service and role identification
- Multiple Attack Vectors: HTTP, MSSQL, and DPAPI exploitation techniques
- Post-Exploitation: Administrative access and lateral movement capabilities
Prerequisites
- Valid Active Directory credentials
- Network access to target SCCM infrastructure
- Python 3.x environment
- Understanding of SCCM architecture and security implications
Next Steps
Getting Started
Installation and initial setup instructions
Enumeration
Begin with LDAP discovery and target identification
Exploitation
Explore available attack vectors and techniques
Post-Exploitation
Administrative access and lateral movement capabilities